Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web based

Results 126 - 150 of 323Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, enterprise applications
    
Okta
Published By: Symantec     Published Date: Apr 02, 2015
The online world can be a scary place as the integration of the Internet into everyone’s lives has also brought with it an ever-increasing trend towards malicious activity. Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers’ sensitive information. It is critical to choose e-commerce security solutions that continually evolve and extend to address a range of ever-changing needs. SSL-based security platforms with solid track records of meeting new challenges are the best way to defend, and future proof, e-commerce environments against a growing and dynamic Internet threat environment.
Tags : 
security solution, ssl, e-commerce environments, malicious activity, safeguard information, ssl-based security, security
    
Symantec
Published By: CDW     Published Date: Mar 27, 2015
IT departments must contend with an array of devices, operating systems and cellular carriers as well as new security threats. Even if IT departments can get a handle on the complex mobility landscape, the technology is so fluid that the picture is constantly changing. That means the IT staff has to devote time to learning about, procuring, deploying and supporting an array of devices. Busy IT departments now have another option for addressing these challenges: a monthly subscription package that provides a customizable web-based portal to automate mobile device procurement, expense management and support.
Tags : 
mobile, data, communication, tablet, smartphone, device, enterprise, tools
    
CDW
Published By: Quark Software     Published Date: Mar 19, 2015
For decades technical writers have reaped the benefits of XML to lower the cost and effort associated with creating, managing and reusing content across multiple output formats. Now, with the introduction of Smart Content, business users and subject matter experts can easily adopt XML in order to keep up with consumer demand for high-value communication. Download the free eBook The Beginner’s Guide to Smart Content and discover: • What is Smart Content? • A Brief Primer on Publishing Processes • The Cost of Smart Content • Who Else Is Using XML for Document Production? • What’s Wrong with XML? • Smart Content Details • 12 Reasons to Adopt Smart Content
Tags : 
xml schema, xml tool, xml authoring, structured authoring, structured content, dynamic publishing, enterprise publishing, automated publishing
    
Quark Software
Published By: CA Technologies     Published Date: Mar 12, 2015
Learn 5 ways to get top mobile app developer talent for your open APIs and see why your organization will benefit from an API portal that allows you to provide a one-stop-shop for registration, documentation, exploration, collaboration, discussion and more.
Tags : 
mobile app, api, security, web-based, interface, it management
    
CA Technologies
Published By: Okta     Published Date: Mar 09, 2015
Many companies believe Active Directory Federation Services (AD FS) is the best choice for applications to integrate with AD. After all, both Active Directory and AD FS are from Microsoft and AD FS is 'free,' so that should be the best choice, right? Not quite. it’s important to realize that not all Active Directory integration solutions are created equal, and IT departments should examine all aspects of implementation when considering a solution. Read this whitepaper and learn what to examine when integrating cloud applications to AD via AD FS.
Tags : 
active directory federation services, integration, it departments, cloud-based identity, access management service, web-based application integrations, it management
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
This report summarizes the most important factors for deciding between Office 365 and on-premises systems to support e-mail, Web-based document sharing, unified and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses. communications, and other collaboration functions. It summarizes the major business and technical factors for evaluating Office 365, outlines the technical capabilities, migration options, and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses.
Tags : 
office 365, on-premises systems, web-based sharing, licensing and purchasing options, technical capabilities, migration options, coexistence, it management
    
Okta
Published By: GE Healthcare     Published Date: Feb 23, 2015
Huron Regional Medical Center added Universal Viewer with Zero Footprint (ZFP), a Web-based image viewing strategy that reliably, timely and financially efficiently delivers images.
Tags : 
zero footprint viewer
    
GE Healthcare
Published By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : 
cloud environment, web application, cloud-based security, ibm, ibm security, security, it management
    
IBM
Published By: Nginx     Published Date: Feb 05, 2015
The success of your web-based service or application is all about serving at the pleasure of the user. Learn what users want in a web experience, the business impact of poor application performance, and how NGINX and NGINX Plus are designed to improve the user experience of your applications. After all, users ultimately decide which sites to visit or apps to use based on what they can get to when it counts.
Tags : 
web-based service, web experience, application performance, user experience, enterprise applications
    
Nginx
Published By: Teradata     Published Date: Jan 28, 2015
Althrough Hadoop and related technologies have been with us for several years, most business intelligence (BI) professionals and their business counterparts still harbor a few misconceptions that need to be corrected about Hadoop and related technologies such as MapReduce. This webcast presents the 10 most common myths about Hadoop, then corrects them. The goal is to clarify what Hadoop is and does relative to BI, as well as in which business and technology situations Hadoop-based BI, data warehousing and analytics can be useful.
Tags : 
teradata, business, intelligence, hadoop, data, integration, analytics, mapreduce
    
Teradata
Published By: Dyn     Published Date: Jan 14, 2015
Every user’s first interaction with your website begins with a series of DNS queries. Poor DNS performance can lead to slow page loads, dissatisfied customers, and lost business. However, you can improve results, contain costs, and make better use of valuable IT personnel by leveraging a cloud-based DNS service.
Tags : 
cloud based, dns service, ddos attack, user experience, infrastructure, dns performace
    
Dyn
Published By: Esker     Published Date: Dec 08, 2014
Is your company looking to gain the efficiencies and savings of automated accounts payable processing? Find out how you can: • Quickly deploy one easy, web-based AP workflow solution for all users and systems • Ensure a continuous invoice audit trail • Simplify shared services setup In this white paper, you'll learn important cost and risk factors to consider with AP tools installed inside ERP applications — especially if you have multiple ERP instances or a mix of different enterprise applications. Download the white paper to learn more!
Tags : 
automation, best practices, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker
Published By: Symantec     Published Date: Nov 19, 2014
This info-graphic provides important statistics and information on web-based targeted attacks and how you can help protect yourself.
Tags : 
web based targeted attacks, internet security, protections from web attacks
    
Symantec
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
    
Symantec Corporation
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility, security
    
GeoTrust
Published By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management
    
Red Hat
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed
Published By: IBM     Published Date: Aug 14, 2014
IBM® Mobile Web Push allows marketers to influence and inform their mobile audience in innovative ways. Web push notifications are dynamically triggered for display on mobile websites based on the actions of your visitors. This personalization is possible without the complications of existing content management, advertisement servers or IT involvement.
Tags : 
ibm, mobile, web push, free notifications, marketing, it management
    
IBM
Published By: Smartling     Published Date: Jul 17, 2014
Using Smartling’s robust translation management system and turnkey Global Delivery Network, NiceLabel, a leading developer of barcode and RFID labeling software, has seen a 45% increase in website leads and more than doubled its translation return on investment. In this case study, you’ll learn how NiceLabel used Smartling’s cloud-based solution to simplify, streamline, and accelerate all of its translation projects.
Tags : 
smartling, website translation, translate website, website internationalization, internationlize website, translate efficiently, efficient translation, global marketing
    
Smartling
Published By: Riverbed     Published Date: Jul 15, 2014
Application environments and the underlying IT infrastructure that supports them are becoming much more dynamic and complicated. New architectures are being deployed to help accelerate time to market, applications are distributed and modular, leveraging web-based or Service Oriented Architectures (SOA). Read this to learn the latest trends.
Tags : 
big data, integrated, end-user, experience, it infrastructure, networking, it management
    
Riverbed
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.